Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /opt/rh/gcc-toolset-11/root/usr/share/systemtap/examples/general/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //opt/rh/gcc-toolset-11/root/usr/share/systemtap/examples/general/tcl-trace.stp
#!/opt/rh/gcc-toolset-11/root/usr/bin/stap 
# Copyright (C) 2018 Red Hat, Inc.
# Written by William Cohen <[email protected]>
#
#   Example usage of the tcl tracepoints to show a nested view of all
#   tcl function calls (and returns) across the whole system.
#
#   Run this using
#       stap tcl-trace.stp
#   to instrument all tcl processes on the system, or (for example) using
#       stap tcl-trace.stp -c COMMAND
#   to instrument a specific program (implemented in tcl)

probe process("/usr/lib*/libtcl*.so").mark("proc__entry")
{
  funcname = user_string($arg1)
  printf("%s => %s\n", thread_indent(1), funcname);
}

probe process("/usr/lib*/libtcl*.so").mark("cmd__entry")
{
  cmdname = user_string($arg1)
  printf("%s >  %s\n", thread_indent(1), cmdname);
}

probe process("/usr/lib*/libtcl*.so").mark("proc__return")
{
  funcname = user_string($arg1)
  printf("%s <= %s\n", thread_indent(-1), funcname);
}

probe process("/usr/lib*/libtcl*.so").mark("cmd__return")
{
  cmdname = user_string($arg1)
  printf("%s <  %s\n", thread_indent(-1), cmdname);
}

Spamworldpro Mini